1. 19 Oct, 2012 9 commits
  2. 12 Oct, 2012 3 commits
    • Konrad Rzeszutek Wilk's avatar
      xen/pv-on-hvm kexec: add quirk for Xen 3.4 and shutdown watches. · cb6b6df1
      Konrad Rzeszutek Wilk authored
      The commit 254d1a3f, titled
      "xen/pv-on-hvm kexec: shutdown watches from old kernel" assumes that the
      XenBus backend can deal with reading of values from:
       "control/platform-feature-xs_reset_watches":
      
          ... a patch for xenstored is required so that it
          accepts the XS_RESET_WATCHES request from a client (see changeset
          23839:42a45baf037d in xen-unstable.hg). Without the patch for xenstored
          the registration of watches will fail and some features of a PVonHVM
          guest are not available. The guest is still able to boot, but repeated
          kexec boots will fail."
      
      Sadly this is not true when using a Xen 3.4 hypervisor and booting a PVHVM
      guest. We end up hanging at:
      
        err = xenbus_scanf(XBT_NIL, "control",
                              "platform-feature-xs_reset_watches", "%d", &supported);
      
      This can easily be seen with guests hanging at xenbus_init:
      
      NX (Execute Disable) protection: active
      SMBIOS 2.4 present.
      DMI: Xen HVM domU, BIOS 3.4.0 05/13/2011
      Hypervisor detected: Xen HVM
      Xen version 3.4.
      Xen Platform PCI: I/O protocol version 1
      ... snip ..
      calling  xenbus_init+0x0/0x27e @ 1
      
      Reverting the commit or using the attached patch fixes the issue. This fix
      checks whether the hypervisor is older than 4.0 and if so does not try to
      perform the read.
      
      Fixes-Oracle-Bug: 14708233
      CC: stable@vger.kernel.org
      Acked-by: default avatarOlaf Hering <olaf@aepfle.de>
      [v2: Added a comment in the source code]
      Signed-off-by: default avatarKonrad Rzeszutek Wilk <konrad.wilk@oracle.com>
      cb6b6df1
    • Konrad Rzeszutek Wilk's avatar
      xen/bootup: allow {read|write}_cr8 pvops call. · 1a7bbda5
      Konrad Rzeszutek Wilk authored
      We actually do not do anything about it. Just return a default
      value of zero and if the kernel tries to write anything but 0
      we BUG_ON.
      
      This fixes the case when an user tries to suspend the machine
      and it blows up in save_processor_state b/c 'read_cr8' is set
      to NULL and we get:
      
      kernel BUG at /home/konrad/ssd/linux/arch/x86/include/asm/paravirt.h:100!
      invalid opcode: 0000 [#1] SMP
      Pid: 2687, comm: init.late Tainted: G           O 3.6.0upstream-00002-gac264ac-dirty #4 Bochs Bochs
      RIP: e030:[<ffffffff814d5f42>]  [<ffffffff814d5f42>] save_processor_state+0x212/0x270
      
      .. snip..
      Call Trace:
       [<ffffffff810733bf>] do_suspend_lowlevel+0xf/0xac
       [<ffffffff8107330c>] ? x86_acpi_suspend_lowlevel+0x10c/0x150
       [<ffffffff81342ee2>] acpi_suspend_enter+0x57/0xd5
      
      CC: stable@vger.kernel.org
      Signed-off-by: default avatarKonrad Rzeszutek Wilk <konrad.wilk@oracle.com>
      1a7bbda5
    • Konrad Rzeszutek Wilk's avatar
      xen/bootup: allow read_tscp call for Xen PV guests. · cd0608e7
      Konrad Rzeszutek Wilk authored
      The hypervisor will trap it. However without this patch,
      we would crash as the .read_tscp is set to NULL. This patch
      fixes it and sets it to the native_read_tscp call.
      
      CC: stable@vger.kernel.org
      Signed-off-by: default avatarKonrad Rzeszutek Wilk <konrad.wilk@oracle.com>
      cd0608e7
  3. 04 Oct, 2012 2 commits
  4. 03 Oct, 2012 1 commit
  5. 02 Oct, 2012 2 commits
  6. 26 Sep, 2012 1 commit
    • Konrad Rzeszutek Wilk's avatar
      Merge branch 'xenarm-for-linus' of... · ae1659ee
      Konrad Rzeszutek Wilk authored
      Merge branch 'xenarm-for-linus' of git://xenbits.xen.org/people/sstabellini/linux-pvhvm into stable/for-linus-3.7
      
      * 'xenarm-for-linus' of git://xenbits.xen.org/people/sstabellini/linux-pvhvm:
        arm: introduce a DTS for Xen unprivileged virtual machines
        MAINTAINERS: add myself as Xen ARM maintainer
        xen/arm: compile netback
        xen/arm: compile blkfront and blkback
        xen/arm: implement alloc/free_xenballooned_pages with alloc_pages/kfree
        xen/arm: receive Xen events on ARM
        xen/arm: initialize grant_table on ARM
        xen/arm: get privilege status
        xen/arm: introduce CONFIG_XEN on ARM
        xen: do not compile manage, balloon, pci, acpi, pcpu and cpu_hotplug on ARM
        xen/arm: Introduce xen_ulong_t for unsigned long
        xen/arm: Xen detection and shared_info page mapping
        docs: Xen ARM DT bindings
        xen/arm: empty implementation of grant_table arch specific functions
        xen/arm: sync_bitops
        xen/arm: page.h definitions
        xen/arm: hypercalls
        arm: initial Xen support
      Signed-off-by: default avatarKonrad Rzeszutek Wilk <konrad.wilk@oracle.com>
      ae1659ee
  7. 25 Sep, 2012 2 commits
    • Konrad Rzeszutek Wilk's avatar
      xen/pciback: Restore the PCI config space after an FLR. · c341ca45
      Konrad Rzeszutek Wilk authored
      When we do an FLR, or D0->D3_hot we may lose the BARs as the
      device has turned itself off (and on). This means the device cannot
      function unless the pci_restore_state is called - which it is
      when the PCI device is unbound from the Xen PCI backend driver.
      For PV guests it ends up calling pci_enable_device / pci_enable_msi[x]
      which does the proper steps
      
      That however is not happening if a HVM guest is run as QEMU
      deals with PCI configuration space. QEMU also requires that the
      device be "parked"  under the ownership of a pci-stub driver to
      guarantee that the PCI device is not being used. Hence we
      follow the same incantation as pci_reset_function does - by
      doing an FLR, then restoring the PCI configuration space.
      
      The result of this patch is that when you run lspci, you get
      now this:
      
      -       Region 0: [virtual] Memory at fe8c0000 (32-bit, non-prefetchable) [size=128K]
      -       Region 1: [virtual] Memory at fe800000 (32-bit, non-prefetchable) [size=512K]
      +       Region 0: Memory at fe8c0000 (32-bit, non-prefetchable) [size=128K]
      +       Region 1: Memory at fe800000 (32-bit, non-prefetchable) [size=512K]
              Region 2: I/O ports at c000 [size=32]
      -       Region 3: [virtual] Memory at fe8e0000 (32-bit, non-prefetchable) [size=16K]
      +       Region 3: Memory at fe8e0000 (32-bit, non-prefetchable) [size=16K]
      
      The [virtual] means that lspci read those entries from SysFS but when
      it read them from the device it got a different value (0xfffffff).
      
      CC: stable@vger.kernel.org #only for 3.5, 3.6
      Signed-off-by: default avatarKonrad Rzeszutek Wilk <konrad.wilk@oracle.com>
      c341ca45
    • Jan Beulich's avatar
      xen-pciback: properly clean up after calling pcistub_device_find() · e6aa70a0
      Jan Beulich authored
      As the function calls pcistub_device_get() before returning non-NULL,
      its callers need to take care of calling pcistub_device_put() on
      (mostly, but not exclusively) error paths.
      
      Otoh, the function already guarantees that the 'dev' member is non-NULL
      upon successful return, so callers do not need to check for this a
      second time.
      Signed-off-by: default avatarJan Beulich <jbeulich@suse.com>
      Signed-off-by: default avatarKonrad Rzeszutek Wilk <konrad.wilk@oracle.com>
      e6aa70a0
  8. 24 Sep, 2012 3 commits
  9. 23 Sep, 2012 1 commit
    • Konrad Rzeszutek Wilk's avatar
      Merge branch 'stable/late-swiotlb.v3.3' into stable/for-linus-3.7 · a5f95155
      Konrad Rzeszutek Wilk authored
      * stable/late-swiotlb.v3.3:
        xen/swiotlb: Fix compile warnings when using plain integer instead of NULL pointer.
        xen/swiotlb: Remove functions not needed anymore.
        xen/pcifront: Use Xen-SWIOTLB when initting if required.
        xen/swiotlb: For early initialization, return zero on success.
        xen/swiotlb: Use the swiotlb_late_init_with_tbl to init Xen-SWIOTLB late when PV PCI is used.
        xen/swiotlb: Move the error strings to its own function.
        xen/swiotlb: Move the nr_tbl determination in its own function.
        swiotlb: add the late swiotlb initialization function with iotlb memory
        xen/swiotlb: With more than 4GB on 64-bit, disable the native SWIOTLB.
        xen/swiotlb: Simplify the logic.
      
      Conflicts:
      	arch/x86/xen/pci-swiotlb-xen.c
      Signed-off-by: default avatarKonrad Rzeszutek Wilk <konrad.wilk@oracle.com>
      a5f95155
  10. 21 Sep, 2012 1 commit
    • Andres Lagar-Cavilla's avatar
      xen/gndev: Xen backend support for paged out grant targets V4. · c571898f
      Andres Lagar-Cavilla authored
      Since Xen-4.2, hvm domains may have portions of their memory paged out. When a
      foreign domain (such as dom0) attempts to map these frames, the map will
      initially fail. The hypervisor returns a suitable errno, and kicks an
      asynchronous page-in operation carried out by a helper. The foreign domain is
      expected to retry the mapping operation until it eventually succeeds. The
      foreign domain is not put to sleep because itself could be the one running the
      pager assist (typical scenario for dom0).
      
      This patch adds support for this mechanism for backend drivers using grant
      mapping and copying operations. Specifically, this covers the blkback and
      gntdev drivers (which map foreign grants), and the netback driver (which copies
      foreign grants).
      
      * Add a retry method for grants that fail with GNTST_eagain (i.e. because the
        target foreign frame is paged out).
      * Insert hooks with appropriate wrappers in the aforementioned drivers.
      
      The retry loop is only invoked if the grant operation status is GNTST_eagain.
      It guarantees to leave a new status code different from GNTST_eagain. Any other
      status code results in identical code execution as before.
      
      The retry loop performs 256 attempts with increasing time intervals through a
      32 second period. It uses msleep to yield while waiting for the next retry.
      
      V2 after feedback from David Vrabel:
      * Explicit MAX_DELAY instead of wrap-around delay into zero
      * Abstract GNTST_eagain check into core grant table code for netback module.
      
      V3 after feedback from Ian Campbell:
      * Add placeholder in array of grant table error descriptions for unrelated
        error code we jump over.
      * Eliminate single map and retry macro in favor of a generic batch flavor.
      * Some renaming.
      * Bury most implementation in grant_table.c, cleaner interface.
      
      V4 rebased on top of sync of Xen grant table interface headers.
      Signed-off-by: default avatarAndres Lagar-Cavilla <andres@lagarcavilla.org>
      Acked-by: default avatarIan Campbell <ian.campbell@citrix.com>
      [v5: Fixed whitespace issues]
      Signed-off-by: default avatarKonrad Rzeszutek Wilk <konrad.wilk@oracle.com>
      c571898f
  11. 18 Sep, 2012 1 commit
    • Jan Beulich's avatar
      xen-pciback: support wild cards in slot specifications · c3cb4709
      Jan Beulich authored
      Particularly for hiding sets of SR-IOV devices, specifying them all
      individually is rather cumbersome. Therefore, allow function and slot
      numbers to be replaced by a wildcard character ('*').
      
      Unfortunately this gets complicated by the in-kernel sscanf()
      implementation not being really standard conformant - matching of
      plain text tails cannot be checked by the caller (a patch to overcome
      this will be sent shortly, and a follow-up patch for simplifying the
      code is planned to be sent when that fixed went upstream).
      Signed-off-by: default avatarJan Beulich <jbeulich@suse.com>
      Signed-off-by: default avatarKonrad Rzeszutek Wilk <konrad.wilk@oracle.com>
      c3cb4709
  12. 17 Sep, 2012 8 commits
  13. 14 Sep, 2012 2 commits
  14. 12 Sep, 2012 4 commits
    • Konrad Rzeszutek Wilk's avatar
      Merge branch 'stable/128gb.v5.1' into stable/for-linus-3.7 · 98104c34
      Konrad Rzeszutek Wilk authored
      * stable/128gb.v5.1:
        xen/mmu: If the revector fails, don't attempt to revector anything else.
        xen/p2m: When revectoring deal with holes in the P2M array.
        xen/mmu: Release just the MFN list, not MFN list and part of pagetables.
        xen/mmu: Remove from __ka space PMD entries for pagetables.
        xen/mmu: Copy and revector the P2M tree.
        xen/p2m: Add logic to revector a P2M tree to use __va leafs.
        xen/mmu: Recycle the Xen provided L4, L3, and L2 pages
        xen/mmu: For 64-bit do not call xen_map_identity_early
        xen/mmu: use copy_page instead of memcpy.
        xen/mmu: Provide comments describing the _ka and _va aliasing issue
        xen/mmu: The xen_setup_kernel_pagetable doesn't need to return anything.
        Revert "xen/x86: Workaround 64-bit hypervisor and 32-bit initial domain." and "xen/x86: Use memblock_reserve for sensitive areas."
        xen/x86: Workaround 64-bit hypervisor and 32-bit initial domain.
        xen/x86: Use memblock_reserve for sensitive areas.
        xen/p2m: Fix the comment describing the P2M tree.
      
      Conflicts:
      	arch/x86/xen/mmu.c
      
      The pagetable_init is the old xen_pagetable_setup_done and xen_pagetable_setup_start
      rolled in one.
      Signed-off-by: default avatarKonrad Rzeszutek Wilk <konrad.wilk@oracle.com>
      98104c34
    • Konrad Rzeszutek Wilk's avatar
      Merge branch 'x86/platform' of... · 25a765b7
      Konrad Rzeszutek Wilk authored
      Merge branch 'x86/platform' of git://git.kernel.org/pub/scm/linux/kernel/git/tip/tip into stable/for-linus-3.7
      
      * 'x86/platform' of git://git.kernel.org/pub/scm/linux/kernel/git/tip/tip: (9690 commits)
        x86: Document x86_init.paging.pagetable_init()
        x86: xen: Cleanup and remove x86_init.paging.pagetable_setup_done()
        x86: Move paging_init() call to x86_init.paging.pagetable_init()
        x86: Rename pagetable_setup_start() to pagetable_init()
        x86: Remove base argument from x86_init.paging.pagetable_setup_start
        Linux 3.6-rc5
        HID: tpkbd: work even if the new Lenovo Keyboard driver is not configured
        Remove user-triggerable BUG from mpol_to_str
        xen/pciback: Fix proper FLR steps.
        uml: fix compile error in deliver_alarm()
        dj: memory scribble in logi_dj
        Fix order of arguments to compat_put_time[spec|val]
        xen: Use correct masking in xen_swiotlb_alloc_coherent.
        xen: fix logical error in tlb flushing
        xen/p2m: Fix one-off error in checking the P2M tree directory.
        powerpc: Don't use __put_user() in patch_instruction
        powerpc: Make sure IPI handlers see data written by IPI senders
        powerpc: Restore correct DSCR in context switch
        powerpc: Fix DSCR inheritance in copy_thread()
        powerpc: Keep thread.dscr and thread.dscr_inherit in sync
        ...
      25a765b7
    • Attilio Rao's avatar
      x86: Document x86_init.paging.pagetable_init() · 64282278
      Attilio Rao authored
      Signed-off-by: default avatarAttilio Rao <attilio.rao@citrix.com>
      Acked-by: <konrad.wilk@oracle.com>
      Cc: <Ian.Campbell@citrix.com>
      Cc: <Stefano.Stabellini@eu.citrix.com>
      Cc: <xen-devel@lists.xensource.com>
      Link: http://lkml.kernel.org/r/1345580561-8506-6-git-send-email-attilio.rao@citrix.comSigned-off-by: default avatarThomas Gleixner <tglx@linutronix.de>
      64282278
    • Attilio Rao's avatar
      x86: xen: Cleanup and remove x86_init.paging.pagetable_setup_done() · c7112887
      Attilio Rao authored
      At this stage x86_init.paging.pagetable_setup_done is only used in the
      XEN case. Move its content in the x86_init.paging.pagetable_init setup
      function and remove the now unused x86_init.paging.pagetable_setup_done
      remaining infrastructure.
      Signed-off-by: default avatarAttilio Rao <attilio.rao@citrix.com>
      Acked-by: <konrad.wilk@oracle.com>
      Cc: <Ian.Campbell@citrix.com>
      Cc: <Stefano.Stabellini@eu.citrix.com>
      Cc: <xen-devel@lists.xensource.com>
      Link: http://lkml.kernel.org/r/1345580561-8506-5-git-send-email-attilio.rao@citrix.comSigned-off-by: default avatarThomas Gleixner <tglx@linutronix.de>
      c7112887